Reference no: EM132593534
INFO 4370 Security of Wireless Systems - Kwantlen Polytechnic University
Term Project: This course includes a required technical term project. The goal of the project is for students to develop a series of laboratory exercises or experiments for wireless network security. These laboratory exercises will be designed to demonstrate the vulnerability that exists in a wireless network by designing wireless network attacks such as ( but not limited to) War driving, Eavesdropping, WEP Key Cracking/Decryption, Man in the Middle attack , MAC Spoofing, ARP Cache Poisoning, and ARP Request Replay. Students will use open source tools such as Aircrack-ng, Cain and Abel, and Mac Makeup in these laboratory exercises to demonstrate how these attacks are conducted. Students will also design countermeasures or defenses to demonstrate how these attacks can be thwarted. Students have freedom to choose the types of attacks to simulate and approach for studying them. It is expected that all term projects will require some amount of additional research and reading.
Create MAC spoofing attack on an open network for our project
Objective of the Project:
The student will gain insight into the wireless offensive security field, which will expand awareness for the need of real world security solutions.
The student will learn to implement attacks against wireless networks in a controlled environment.
The student will learn to provide measures or defenses against wireless attacks.
The student will gain understanding to available wireless attack and monitoring tools for different operating systems.
Developing the project
Do through research on wireless vulnerabilities and decide on the vulnerabilities you want to experiment with. When you have decided on the vulnerabilities you want to work on, look into open source tools that will help you design various experiments. Create your environment in the lab where you can experiment with your chosen vulnerabilities. Keep in mind that the purpose of the experiments is to demonstrate the weaknesses of Wireless system and to design mechanisms of defense against these vulnerabilities.
Requirements:
• Your final report must be professionally written, technical and precise. Avoid verbosity. You will be graded on the content and the presentation, but not on the length of the document. The paper should be written in your own words. All sources consulted should be explicitly cited. Bibliographic entries should be complete. Direct quotation should only be used when appropriate. All direct quotations should be clearly identified in the text.
• Your report should normally have the following logical components; the keyword is logical -- physical organization of the paper can again vary enormously depending on personal style and nature of the topic but can still have the logical components.
Introduction: The problem statement (what & why), how it is related to Wireless security in general, aim and scope and nature of the present study.
Basic Terminology and existing literature: Do not try to define everything -- you'll define only those things that are important for understanding the subsequent material and that are not expected of any INFO 4370 student.
Main Results: Depending on what you have done (use as many subsections as you wish. For each experiment include the following:
Purpose of the experiment
Test Environment (Hardware/Software)
o Hardware Configuration of victim machine
o Operating System used in victim machine
o Hardware Configuration of intruder machine
o Operating System used in intruder machine
o Software tools used in victim machine
o Software tools in intruder machine
Network Topology (Test Experiment Scenarios)
Step by step procedures of the experiment (mounting the attack) Experimental results (with screen shots)
Analysis of the result
Measures /Defenses used to detect or thwart the attack
Conclusion: Give a summary, highlight the main points of your study, and discuss limitations and further work that can be done.
Attachment:- Project.rar
Revitalizing a brand-current marketing communication
: Describe the current marketing communication, identity, and brand position of Plaza Home Health Services.
|
Calculate equivalent units schedule
: Conversion costs RM15,000. Calculate equivalent units schedule. Calculate the unit costs (Note: Round answer to two decimal places)
|
Discuss the elements of organizational designs
: Discuss the elements of organizational designs and how organizational design is linked to organizational behavior, communication, delegation, job satisfaction,
|
What are some of most critical ratios
: What are some of the most critical ratios that we've discussed this week? Which ratios strictly related to profitability?
|
Implement attacks against wireless networks
: Implement attacks against wireless networks in a controlled environment - provide measures or defenses against wireless attacks
|
Creation of areas like the valley of death
: What attitudes and values on the part of business and others lead to the creation of areas like the "Valley of Death?"
|
What are carol tax consequences as a result
: Corporation, a US corporation, in exchange for one payment of $1,000 paid to her Swiss bank account, What are Carol tax consequences as a result
|
Compute Riggs diluted EPS for the year ended December
: Common stock ($1 par, 300,000 shares issued 300,000 Additional paid-in capital 2,100,000, Compute Riggs diluted EPS for the year ended December
|
VPN useful in business world
: Describe a scenario where you might find a VPN useful in the business world. What are some major concerns you might have as a network manager?
|